Editor_In_Chief

Editor_In_Chief

Last seen: 17 days ago

An award-winning political journalist formerly with Nigerian Tribune Newspaper with almost two decades reporting news across the globe. I expose and report on government censorship and focus on freedom of speech as a vehicle to be truly free from the oppression of government dictatorship.

Member since May 13, 2019 editor_darkrebel.net@protonmail.com

Following (8)

Followers (1)

Latest Threats
Latest Mirai Variant Targets SonicWall, D-Link and IoT Devices

Latest Mirai Variant Targets SonicWall, D-Link and IoT...

A new Mirai variant is targeting known flaws in D-Link, Netgear and SonicWall devices,...

Politics & Governance
Thank You for Speaking Against a Terrible Copyright Proposal

Thank You for Speaking Against a Terrible Copyright Proposal

Last week was the deadline for comments on the draft of the so-called “Digital Copyright...

Politics & Governance
The Foilies 2021

The Foilies 2021

Recognizing the year's worst in government transparency. The Foilies were compiled...

Latest Threats
Google Warns Mac, Windows Users of Chrome Zero-Day Flaw

Google Warns Mac, Windows Users of Chrome Zero-Day Flaw

The use-after-free vulnerability is the third Google Chrome zero-day flaw to be...

Latest Threats
Cyberattacks See Fundamental Changes, A Year into COVID-19

Cyberattacks See Fundamental Changes, A Year into COVID-19

A year after COVID-19 was officially determined to be a pandemic, the methods and...

Latest Threats
Microsoft Exchange Exploits Pave a Ransomware Path

Microsoft Exchange Exploits Pave a Ransomware Path

As attacks double every hour, hackers are exploiting vulnerable Microsoft Exchange...

Latest Threats
Metamorfo Banking Trojan Abuses AutoHotKey to Avoid Detection

Metamorfo Banking Trojan Abuses AutoHotKey to Avoid Detection

A legitimate binary for creating shortcut keys in Windows is being used to help...

Exploits
DLLHSC - DLL Hijack SCanner A Tool To Assist With The Discovery Of Suitable Candidates For DLL Hijacking

DLLHSC - DLL Hijack SCanner A Tool To Assist With The Discovery...

DLL Hijack SCanner - A tool to generate leads and automate the discovery of candidates...

Latest Threats
Europol Credits Sweeping Arrests to Cracked Sky ECC Comms  

Europol Credits Sweeping Arrests to Cracked Sky ECC Comms...

Sky ECC claims that cops cracked a fake version of the app being passed off by disgruntled...

Latest Threats
REvil Group Claims Slew of Ransomware Attacks

REvil Group Claims Slew of Ransomware Attacks

The threat group behind the Sodinokibi ransomware claimed to have recently compromised...

Latest Threats
Critical Security Hole Can Knock Smart Meters Offline

Critical Security Hole Can Knock Smart Meters Offline

Unpatched Schneider Electric PowerLogic ION/PM smart meters are open to dangerous...

Latest Threats
F5, CISA Warn of Critical BIG-IP and BIG-IQ RCE Bugs

F5, CISA Warn of Critical BIG-IP and BIG-IQ RCE Bugs

The F5 flaws could affect the networking infrastructure for some of the largest...

Exploits
PowerSharpPack - Many usefull offensive CSharp Projects wraped into Powershell for easy usage

PowerSharpPack - Many usefull offensive CSharp Projects...

Many usefull offensive CSharp Projects wraped into Powershell for easy usage. Why?...

Latest Threats
FIN8 Resurfaces with Revamped Backdoor Malware

FIN8 Resurfaces with Revamped Backdoor Malware

The financial cyber-gang is running limited attacks ahead of broader offensives...

Latest Threats
Linux Systems Under Attack By New RedXOR Malware

Linux Systems Under Attack By New RedXOR Malware

Researchers say the new RedXOR backdoor is targeting Linux systems with various...

Latest Threats
Microsoft Exchange Servers Face APT Attack Tsunami

Microsoft Exchange Servers Face APT Attack Tsunami

At least 10 nation-state-backed groups are using the ProxyLogon exploit chain to...

Latest Threats
NanoCore RAT Scurries Past Email Defenses with .ZIPX Tactic

NanoCore RAT Scurries Past Email Defenses with .ZIPX Tactic

A spam campaign hides a malicious executable behind file archive extensions.

Politics & Governance
Seattle and Portland: Say No to Public-Private Surveillance Networks

Seattle and Portland: Say No to Public-Private Surveillance...

An organization calling itself Safe Cities Northwest is aiming to create public-private...

Exploits
HTTP Bridge - Send TCP Stream Packets Over Simple HTTP Request

HTTP Bridge - Send TCP Stream Packets Over Simple HTTP...

I've wrote this program as a proof of concept to test the idea of be able to send...

Exploits
Gitls - Enumerate Git Repository URL From List Of URL / User / Org

Gitls - Enumerate Git Repository URL From List Of URL /...

Enumerate git repository URL from list of URL / User / Org. Friendly to pipeline...

Politics & Governance
Congress Proposes Bold Plan to End the Digital Divide

Congress Proposes Bold Plan to End the Digital Divide

New year, new Congress, but the problems of Internet access remains. If anything,...

Politics & Governance
App Stores Have Kicked Out Some Location Data Brokers. Good, Now Kick Them All Out.

App Stores Have Kicked Out Some Location Data Brokers....

Last fall, reports revealed the location data broker X-Mode’s ties to several U.S....

Politics & Governance
EFF to Supreme Court: Users Must Be Able to Hold Tech Companies Accountable in Lawsuits When Their Data is Mishandled

EFF to Supreme Court: Users Must Be Able to Hold Tech Companies...

Facebook, Google, and Others Want To Make It Harder For Users To Sue Washington,...

Politics & Governance
Internet Advocates Call on ISPs to Commit to Basic User Privacy Protections

Internet Advocates Call on ISPs to Commit to Basic User...

This blog post was co-written by EFF, the Internet Society, and Mozilla. As people...

This is not the Darkweb, so unfortunately the site uses cookies. By continuing to browse the site you are agreeing to our use of cookies Find out more here